| 2008 |
| 17 | EE | Peeter Laud:
On the computational soundness of cryptographically masked flows.
POPL 2008: 337-348 |
| 16 | EE | Peeter Laud,
Long Ngo:
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library.
ProvSec 2008: 298-312 |
| 2007 |
| 15 | EE | Ilja Tsahhirov,
Peeter Laud:
Application of Dependency Graphs to Security Protocol Analysis.
TGC 2007: 294-311 |
| 2006 |
| 14 | EE | Michael Backes,
Peeter Laud:
Computationally sound secrecy proofs by mechanized flow analysis.
ACM Conference on Computer and Communications Security 2006: 370-379 |
| 13 | EE | Ahto Buldas,
Peeter Laud,
Jaan Priisalu,
Märt Saarepera,
Jan Willemson:
Rational Choice of Security Measures Via Multi-parameter Attack Trees.
CRITIS 2006: 235-248 |
| 12 | EE | Peeter Laud,
Tarmo Uustalu,
Varmo Vene:
Type systems equivalent to data-flow analyses for imperative languages.
Theor. Comput. Sci. 364(3): 292-310 (2006) |
| 2005 |
| 11 | EE | Peeter Laud:
Secrecy types for a simulatable cryptographic library.
ACM Conference on Computer and Communications Security 2005: 26-35 |
| 10 | EE | Peeter Laud,
Varmo Vene:
A Type System for Computationally Secure Information Flow.
FCT 2005: 365-377 |
| 9 | EE | Ahto Buldas,
Peeter Laud,
Märt Saarepera,
Jan Willemson:
Universally Composable Time-Stamping Schemes with Audit.
ISC 2005: 359-373 |
| 2004 |
| 8 | EE | Peeter Laud:
Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries.
IEEE Symposium on Security and Privacy 2004: 71-85 |
| 2003 |
| 7 | EE | Peeter Laud:
Handling Encryption in an Analysis for Secure Information Flow.
ESOP 2003: 159-173 |
| 6 | EE | Peeter Laud,
Ricardo Corin:
Sound Computational Interpretation of Formal Encryption with Composed Keys.
ICISC 2003: 55-66 |
| 2002 |
| 5 | | Ahto Buldas,
Peeter Laud,
Helger Lipmaa:
Eliminating Counterevidence with Applications to Accountable Certificate Management.
Journal of Computer Security 10(3): 273-296 (2002) |
| 2001 |
| 4 | EE | Peeter Laud:
Semantics and Program Analysis of Computationally Secure Information Flow.
ESOP 2001: 77-91 |
| 2000 |
| 3 | EE | Ahto Buldas,
Peeter Laud,
Helger Lipmaa:
Accountable certificate management using undeniable attestations.
ACM Conference on Computer and Communications Security 2000: 9-17 |
| 1998 |
| 2 | EE | Ahto Buldas,
Peeter Laud,
Helger Lipmaa,
Jan Willemson:
Time-Stamping with Binary Linking Schemes.
CRYPTO 1998: 486-501 |
| 1 | | Ahto Buldas,
Peeter Laud:
New linking schemes for digital time-stamping.
ICISC 1998: 3-13 |